Search Results - (( java implementation mining algorithm ) OR ( using box study algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys
Published 2014“…Static S-Box allows attackers to study S-Box and discover weak issues while by using dynamic S-Box approach, it makes difficult and more complex for attacker to do any offline study of an attack of one particular set of S- boxes. …”
Get full text
Get full text
Conference or Workshop Item -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Hybrid ant colony optimization algorithm for container loading problem
Published 2012“…The TB heuristic placed the base box on the container floor and packed the boxes on the base box by stacking them one by one until the container is full, whereas other researchers used the stack building heuristic to generate a set of box towers from all of the given boxes then only arranged them into the container. …”
Get full text
Get full text
Thesis -
10
Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH
Published 2018“…This study is proposing a new algorithm of Box-Jenkins and GARCH (or BJ-G) in evaluating the multistep forecasting performance of the BJ-G model for highly volatile time series data. …”
Get full text
Get full text
Conference or Workshop Item -
11
AES S-box modification uses affine matrices exploration for increased S-box strength
Published 2025“…This paper modifies the AES S-box algorithm. The modification begins with the irreducible polynomial in the AES S-box, x8 ? …”
Get full text
Get full text
Get full text
Article -
12
Harmony Search Approach In The Strut And Tie Model To Optimise The Stress Distribution In A Concrete Box Girder
Published 2021“…This study aims to develop a stress optimisation model using harmony search (HS) algorithm to control and limit cracks in the concrete. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
-
14
Dynamic S-boxes and spiral permutation function on Fibonacci sequence for secure block cipher / Kamsiah Mohamed
Published 2022“…In conclusion, this proposed block cipher can also be used as a secure algorithm by nations, organisations or stakeholders to improve data protection besides contributing to computer security research as an alternative to other cryptographic algorithms. …”
Get full text
Get full text
Thesis -
15
Box-jenkins and genetic algorithm hybrid model for electricity forecasting system
Published 2005“…Time Series method has always been used in a variety of forecasting applications. In this thesis, an approach that combines the Box-Jenkins methodology for SARIMA model and Genetic Algorithm (GA) will been introduced as a new approach in making a forecast. …”
Get full text
Get full text
Thesis -
16
Small Dataset Learning In Prediction Model Using Box-Whisker Data Transformation
Published 2020“…Hence, the aims of this study are proposing an algorithm of hybrid to generate artificial samples adopts Small Johnson Data Transformation and Box-Whisker Plot which is introduced in previous studies. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
-
18
-
19
Interpretation of machine learning model using medical record visual analytics
Published 2021“…This paper studied on the effectiveness of visual analytics techniques to identify the appropriate technique to be instantiated to the machine learning algorithm to further elaborate the results obtained by demonstrating transparency, interpreta- bility and explainability of the machine learning algorithm. …”
Get full text
Get full text
Proceeding Paper -
20
